Steven Noel
Steven Noel
Cybersecurity Researcher, The MITRE Corporation
Dirección de correo verificada de mitre.org - Página principal
TítuloCitado porAño
Topological analysis of network attack vulnerability
S Jajodia, S Noel, B O’Berry
Managing Cyber Threats: Issues, Approaches and Challenges, 247-266, 2005
5162005
Efficient minimum-cost network hardening via exploit dependency graphs
S Noel, S Jajodia, B O'Berry, M Jacobs
19th Annual Computer Security Applications Conference, 2003. Proceedings., 86-95, 2003
3292003
Managing Attack Graph Complexity Through Visual Hierarchical Aggregation
S Noel, S Jajodia
Proceedings of the ACM Workshop on Visualization and Data Mining for …, 2004
2952004
Minimum-cost network hardening using attack graphs
L Wang, S Noel, S Jajodia
Computer Communications 29 (18), 3812-3824, 2006
2902006
Correlating intrusion events and building attack scenarios through attack graph distances
S Noel, E Robertson, S Jajodia
20th Annual Computer Security Applications Conference, 350-359, 2004
1942004
Understanding complex network attack graphs through clustered adjacency matrices
S Noel, S Jajodia
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-169, 2005
1482005
k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities
L Wang, S Jajodia, A Singhal, P Cheng, S Noel
IEEE Transactions on Dependable and Secure Computing 11 (1), 30-44, 2013
1282013
Representing TCP/IP connectivity for topological analysis of network security
R Ritchey, B O'Berry, S Noel
18th Annual Computer Security Applications Conference, 2002. Proceedings., 25-31, 2002
1282002
Multiple coordinated views for network attack graphs
S Noel, M Jacobs, P Kalapa, S Jajodia
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 99-106, 2005
1262005
Modern intrusion detection, data mining, and degrees of attack guilt
S Noel, D Wijesekera, C Youman
Applications of data mining in computer security, 1-31, 2002
1222002
Measuring security risk of networks using attack graphs
S Noel, S Jajodia, L Wang, A Singhal
International Journal of Next-Generation Computing 1 (1), 135-147, 2010
1192010
Time-efficient and cost-effective network hardening using attack graphs
M Albanese, S Jajodia, S Noel
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
1132012
Cauldron mission-centric cyber situational awareness with defense in depth
S Jajodia, S Noel, P Kalapa, M Albanese, J Williams
2011-MILCOM 2011 Military Communications Conference, 1339-1344, 2011
1132011
Optimal ids sensor placement and alert prioritization using attack graphs
S Noel, S Jajodia
Journal of Network and Systems Management 16 (3), 259-275, 2008
912008
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
L Wang, S Jajodia, A Singhal, S Noel
European Symposium on Research in Computer Security, 573-587, 2010
902010
Topological vulnerability analysis
S Jajodia, S Noel
Cyber situational awareness, 139-154, 2010
902010
Topological vulnerability analysis: A powerful new approach for network attack prevention, detection, and response
S Jajodia, S Noel
Algorithms, architectures and information systems security, 285-305, 2009
762009
Advances in topological vulnerability analysis
S Noel, M Elder, S Jajodia, P Kalapa, S O'Hare, K Prole
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
682009
Recent results in wavelet applications
I Daubechies
Journal of Electronic Imaging 7 (4), 1998
621998
Metrics suite for network attack graph analytics
S Noel, S Jajodia
Proceedings of the 9th Annual Cyber and Information Security Research …, 2014
542014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20